Αρχείο Λευκής Βίβλου

Πρόσφατα θέματα:

Overcome the Challenges of Building Your Own Cybersecurity Program with an MSSP

Organizations of every size and in every industry feel the necessity and urgency to strengthen their cybersecurity efforts. Enterprises have moved beyond simply securing the perimeter and now recognize the need to protect a gro...

Προβολή μελέτης περίπτωσης

RBEI Partners With Tata Communications for Watertight Cyber Security

Robert Bosch Engineering and Business Solutions (RBEI) is on an aggressive growth path and an essential part of this was a need for an integrated IT network to improve efficiency and connectivity. RBEI chose Tata Communications...

Προβολή μελέτης περίπτωσης

How to Secure the Human Link

Even the best technology-based controls can only do so much, which is why an awareness training program is essential for improving employees’ resilience to social engineering attacks across a range of communication mediums. Wit...

Μάθετε περισσότερα

Planning for Office 365 Gaps

There is a major shift happening in the world of enterprise IT systems. Many organizations are trading on-premises systems for cloud-based solutions, a move that brings virtually limitless scalability, storage and accessibilit...

Προβολή Λευκής Βίβλου

Best Practices for Implementing Security Awareness Training

What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, qu...

Προβολή Λευκής Βίβλου

Threat Intelligence: How Every CISO Can Make it a Priority

“As a security industry, we have to move away from being in a constant state of reaction. I want to minimize damage to my organization—I want prevention.” - Malcolm Harkins, Chief Security and Trust Officer, Cylance Big budge...

Προβολή Λευκής Βίβλου

6 Tips To Fend Off Security Threats Without Paying A King's Ransom

The threat of ransomware is still – unfortunately – alive and well. According to a 2018 study by SentinelOne, their survey of decision makers working in IT and risk, fraud or compliance functions found that six in ten (56%) rep...

Προβολή Λευκής Βίβλου

NISD: Networking and Information Systems (NIS) Directive

The NIS Directive provides legal measures that will boost the overall level of cybersecurity in the EU, particularly for industries and organisations that provide services essential to everyday life and the security of a nation...

Προβολή Λευκής Βίβλου

Threat Hunting 101: 8 threat hunts you can do with available resources

Threat hunting is the process of proactively searching for malware or attackers that reside on your network. The generally accepted method is to leverage a security information and event management (SIEM) solution that centrall...

Προβολή Λευκής Βίβλου

Edge-based industrial machine vision applications

Machine vision systems are pervasive. You’ll find them everywhere you go and they are part of everything you use. From spam filters to image recognition and processing, they have permeated our daily lives, whether at home, at w...

Προβολή Λευκής Βίβλου
Εγγραφείτε στο ενημερωτικό μας δελτίο
Τα σημαντικότερα νέα δωρεάν μέσω E-Mail